From: Alexander Marx Date: Thu, 17 Oct 2013 09:27:48 +0000 (+0200) Subject: Firewall: Some changes in Strings and languagefiles X-Git-Tag: v2.15-beta1~186^2~16 X-Git-Url: http://git.ipfire.org/?p=people%2Fpmueller%2Fipfire-2.x.git;a=commitdiff_plain;h=86a921ee47cc1bd24ff01139b4867dc577c3e564 Firewall: Some changes in Strings and languagefiles --- diff --git a/config/forwardfw/rules.pl b/config/forwardfw/rules.pl index fcaade2d66..f23430f72c 100755 --- a/config/forwardfw/rules.pl +++ b/config/forwardfw/rules.pl @@ -53,16 +53,17 @@ my $configoutgoing = "${General::swroot}/forward/outgoing"; my $p2pfile = "${General::swroot}/forward/p2protocols"; my $configgrp = "${General::swroot}/fwhosts/customgroups"; my $netsettings = "${General::swroot}/ethernet/settings"; -my $errormessage=''; -my $orange; -my $green; -my $blue; +my $errormessage = ''; +my $orange = ''; +my $green = ''; +my $blue = ''; my ($TYPE,$PROT,$SPROT,$DPROT,$SPORT,$DPORT,$TIME,$TIMEFROM,$TIMETILL,$SRC_TGT); -my $CHAIN="FORWARDFW"; -my $conexists='off'; -my $command = 'iptables -A'; -my $dnat=''; -my $snat=''; +my $CHAIN = "FORWARDFW"; +my $conexists = 'off'; +my $command = 'iptables -A'; +my $dnat =''; +my $snat =''; + &General::readhash("${General::swroot}/forward/settings", \%fwdfwsettings); &General::readhash("$netsettings", \%defaultNetworks); &General::readhasharray($configfwdfw, \%configfwdfw); @@ -81,13 +82,13 @@ if (-f "/var/ipfire/red/active"){ open (CONN1,"/var/ipfire/red/local-ipaddress"); my $redip = ; close(CONN1); -################################ -# DEBUG/TEST # -################################ +################# +# DEBUG/TEST # +################# my $MODE=0; # 0 - normal operation - # 1 - print configline and rules to console - # -################################ + # 1 - print configline and rules to console + # +################# my $param=shift; if($param eq 'flush'){ @@ -107,7 +108,7 @@ if($param eq 'flush'){ if($MODE eq '0'){ if ($fwdfwsettings{'POLICY'} eq 'MODE1'){ &p2pblock; - system ("/usr/sbin/firewall-policy"); + system ("/usr/sbin/firewall-policy"); }elsif($fwdfwsettings{'POLICY'} eq 'MODE2'){ &p2pblock; system ("iptables -A $CHAIN -m conntrack --ctstate NEW -j ACCEPT"); @@ -123,7 +124,7 @@ sub flush system ("iptables -F OUTGOINGFW"); system ("iptables -t nat -F NAT_DESTINATION"); system ("iptables -t nat -F NAT_SOURCE"); -} +} sub preparerules { if (! -z "${General::swroot}/forward/config"){ @@ -236,12 +237,12 @@ sub buildrules if($$hash{$key}[24] ne ''){push (@timeframe,"Sat");} if($$hash{$key}[25] ne ''){push (@timeframe,"Sun");} $TIME=join(",",@timeframe); - + $TIMEFROM="--timestart $time1 "; $TIMETILL="--timestop $time2 "; $TIME="-m time --weekdays $TIME $TIMEFROM $TIMETILL"; } - if ($MODE eq '1'){ + if ($MODE eq '1'){ print "NR:$key "; foreach my $i (0 .. $#{$$hash{$key}}){ print "$i: $$hash{$key}[$i] "; @@ -301,7 +302,10 @@ sub buildrules if ($PROT ne '-p ICMP'){ print "iptables -A $$hash{$key}[1] $PROT $STAG $sourcehash{$a}[0] $SPORT -d $targethash{$b}[0] $DPORT $TIME -j $$hash{$key}[0]\n"; } - } + if ($PROT eq '-p ICMP' && $$hash{$key}[9] eq 'All ICMP-Types'){ + print "iptables -A $$hash{$key}[1] $PROT $STAG $sourcehash{$a}[0] $SPORT -d $targethash{$b}[0] $DPORT $TIME -j $$hash{$key}[0]\n"; + } + } } } } @@ -364,7 +368,11 @@ sub buildrules if ($PROT ne '-p ICMP'){ system "iptables -A $$hash{$key}[1] $PROT $STAG $sourcehash{$a}[0] $SPORT -d $targethash{$b}[0] $DPORT $TIME -j $$hash{$key}[0]\n"; } - } + #PROCESS Prot ICMP and type = All ICMP-Types + if ($PROT eq '-p ICMP' && $$hash{$key}[9] eq 'All ICMP-Types'){ + system "iptables -A $$hash{$key}[1] $PROT $STAG $sourcehash{$a}[0] $SPORT -d $targethash{$b}[0] $DPORT $TIME -j $$hash{$key}[0]\n"; + } + } } } } @@ -472,7 +480,7 @@ sub get_address my $type=shift; #src or tgt my $hash; if ($type eq 'src'){ - $hash=\%sourcehash; + $hash=\%sourcehash; }else{ $hash=\%targethash; } diff --git a/html/cgi-bin/forwardfw.cgi b/html/cgi-bin/forwardfw.cgi index afd5ece35a..3e7b9a8f46 100755 --- a/html/cgi-bin/forwardfw.cgi +++ b/html/cgi-bin/forwardfw.cgi @@ -1736,7 +1736,7 @@ END END &General::readhasharray("${General::swroot}/fwhosts/icmp-types", \%icmptypes); - print""; + print""; foreach my $key (sort { ncmp($icmptypes{$a}[0],$icmptypes{$b}[0]) }keys %icmptypes){ if ($icmptypes{$key}[0] eq $fwhostsettings{'oldsrvicmp'}){ print""; @@ -1679,8 +1679,8 @@ END print<$customservice{$key}[0]$customservice{$key}[2]$customservice{$key}[1] END - if($customservice{$key}[3] ne 'BLANK'){print $customservice{$key}[3];} - + if($customservice{$key}[3] eq 'All ICMP-Types'){print $Lang::tr{'fwdfw all icmp'};} + elsif($customservice{$key}[3] ne 'BLANK'){print $customservice{$key}[3];} print<$customservice{$key}[4]x
diff --git a/langs/de/cgi-bin/de.pl b/langs/de/cgi-bin/de.pl index b0875068cd..f6b22ec0fa 100644 --- a/langs/de/cgi-bin/de.pl +++ b/langs/de/cgi-bin/de.pl @@ -912,6 +912,7 @@ 'fw settings dropdown' => 'Alle Netzwerke auf Regelerstellungsseite anzeigen', 'fw settings remark' => 'Anmerkungen in Regeltabelle anzeigen', 'fw settings ruletable' => 'Leere Regeltabellen anzeigen', +'fwdfw all icmp' => 'Alle ICMP-Typen', 'fwdfw ACCEPT' => 'Akzeptieren (ACCEPT)', 'fwdfw DROP' => 'Verwerfen (DROP)', 'fwdfw MODE1' => 'Alle Pakete verwerfen', @@ -987,8 +988,8 @@ 'fwdfw toggle' => 'Aktivieren oder deaktivieren', 'fwdfw togglelog' => 'Log aktivieren oder deaktivieren', 'fwdfw use nat' => 'NAT benutzen', -'fwdfw use srcport' => 'Quellport(s) benutzen:', -'fwdfw use srv' => 'Zielport(s) benutzen:', +'fwdfw use srcport' => 'Quellport:', +'fwdfw use srv' => 'Zielport:', 'fwdfw useless rule' => 'Diese Regel ist nicht sinnvoll.', 'fwdfw wd_fri' => 'Fr', 'fwdfw wd_mon' => 'Mo', diff --git a/langs/en/cgi-bin/en.pl b/langs/en/cgi-bin/en.pl index 4b4b153c82..4c1c465082 100644 --- a/langs/en/cgi-bin/en.pl +++ b/langs/en/cgi-bin/en.pl @@ -937,6 +937,7 @@ 'fw settings dropdown' => 'Show all networks on rulecreation site', 'fw settings remark' => 'Show remarks in ruletable', 'fw settings ruletable' => 'Show empty ruletables', +'fwdfw all icmp' => 'All ICMP-Types', 'fwdfw ACCEPT' => 'ACCEPT', 'fwdfw DROP' => 'DROP', 'fwdfw MODE1' => 'Drop all packets', @@ -1012,8 +1013,8 @@ 'fwdfw toggle' => 'Activate or deactivate', 'fwdfw togglelog' => 'Activate or deactivate logging', 'fwdfw use nat' => 'Use NAT', -'fwdfw use srcport' => 'Use source port(s):', -'fwdfw use srv' => 'Use destination port(s):', +'fwdfw use srcport' => 'Source port:', +'fwdfw use srv' => 'Destination port:', 'fwdfw useless rule' => 'This rule is useless.', 'fwdfw wd_fri' => 'Fri', 'fwdfw wd_mon' => 'Mon',